Privacy-preserving function computation by exploitation of friendships in social networks
暂无分享,去创建一个
[1] D. West. Introduction to Graph Theory , 1995 .
[2] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[3] Ran Wolff,et al. k-TTP: a new privacy model for large-scale distributed environments , 2004, KDD.
[4] Fatma Ozcan. Proceedings of the 2005 ACM SIGMOD international conference on Management of data , 2005, SIGMOD 2005.
[5] David P. Varodayan,et al. Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] Stanford,et al. Learning to Discover Social Circles in Ego Networks , 2012 .
[7] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[8] Wenliang Du,et al. Deriving private information from randomized data , 2005, SIGMOD '05.
[9] Panganamala Ramana Kumar,et al. Computing and communicating functions over sensor networks , 2005, IEEE Journal on Selected Areas in Communications.
[10] D. Marchette. Random Graphs for Statistical Pattern Recognition , 2004 .
[11] L. Takac. DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS , 2012 .
[12] Chris Clifton,et al. A Guide to Differential Privacy Theory in Social Network Analysis , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[13] Paris Smaragdis,et al. A Framework for Secure Speech Recognition , 2007, IEEE Trans. Speech Audio Process..
[14] Sheng Zhong,et al. k-Anonymous data collection , 2009, Inf. Sci..
[15] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[16] Julien Bringer,et al. Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends , 2013, IEEE Signal Processing Magazine.
[17] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[18] Mauro Barni,et al. Private Computing with Garbled Circuits [Applications Corner] , 2013, IEEE Signal Processing Magazine.
[19] Hong Shen,et al. Effective Reconstruction of Data Perturbed by Random Projections , 2012, IEEE Transactions on Computers.
[20] Zekeriya Erkin,et al. Generating private recommendations in a social trust network , 2011, 2011 International Conference on Computational Aspects of Social Networks (CASoN).
[21] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[22] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[23] Jianer Chen,et al. Performance Measurements for Privacy Preserving Data Mining , 2005, PAKDD.
[24] Guy Gogniat,et al. Recent Advances in Homomorphic Encryption , 2013 .
[25] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[26] Claudio Orlandi,et al. Is multiparty computation any good in practice? , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[27] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[28] Pramod Viswanath,et al. The optimal mechanism in differential privacy , 2012, 2014 IEEE International Symposium on Information Theory.
[29] Parv Venkitasubramaniam,et al. Maximizing privacy in Variable Bit rate Coding , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[30] H. Vincent Poor,et al. The Role of Signal Processing in Meeting Privacy Challenges: An Overview , 2013, IEEE Signal Processing Magazine.
[31] Assaf Schuster,et al. Data mining with differential privacy , 2010, KDD.
[32] Hong Shen,et al. Efficient and secure protocols for privacy-preserving set operations , 2009, TSEC.
[33] Laurence A. Wolsey,et al. Integer and Combinatorial Optimization , 1988 .